logoalt Hacker News

staticassertiontoday at 10:26 AM0 repliesview on HN

Typically you do things like this to either work in restricted envs (distroless) or to evade detection logic. It's not about bypassing a boundary, it's about getting things done in the env you have available.